Link Layer Discovery Protocol

Size: px
Start display at page:

Download "Link Layer Discovery Protocol"

Transcription

1 12 Link Layer Discovery Protocol Contents Overview LLDP LLDP Messages Viewing LLDP Neighbor Information Viewing Local LLDP Activity Viewing Real-Time LLDP Messages: debug lldp Commands Viewing LLDP Timers Configuring LLDP Preventing an Interface from Sending Certain LLDP Messages Preventing an Interface from Receiving LLDP Messages Altering LLDP Timers Quick Start

2 Overview Overview Routing protocols allow routers to learn about each other dynamically as a network expands and changes. However, these protocols run over Layer 3 of the Open Systems Interconnection (OSI) model. Devices such as switches, which operate on Layer 2, do not participate. Networks expand all the time; switches are moved, and new ones are added. Devices need to stay up to date on these changes. Link Layer Discovery Protocol (LLDP), which runs over OSI Layer 2, allows locally attached devices in a network, such as switches and routers, to advertise information about themselves to listening devices. (See Figure 12-1.) Because devices continually broadcast and listen for LLDP messages, they can discover when a new device is added or one removed. In this way, they maintain an accurate picture of a dynamic network. Switch LLDP messages Routing protocols LLDP messages Switch Router Router Switch LLDP messages LLDP messages Figure LLDP LLDP LLDP functions over any Data Link Layer network. Nodes transmit information about themselves and listen for information about the devices on each connection. With this information, they compile a picture of the network and of the neighbors that they can reach. Nodes identify neighbors according to the information (such as MAC address and system name) they receive in LLDP messages. LLDP messages also include a network address where a management process such as a Simple Network Management Protocol (SNMP) server can reach the endpoint. 12-2

3 Overview LLDP runs over the Data Link Layer, so devices that use different Network Layer protocols can still identify each other. The ProCurve Secure Router automatically participates in LLDP so that the router can learn about the devices to which it connects and so that it can inform other devices of its presence. Interfaces on the ProCurve Secure Router that run LLDP include: Ethernet interfaces Point-to-Point Protocol (PPP) interfaces High-level Data Link Control (HDLC) interfaces Frame Relay subinterfaces demand interfaces LLDP Messages Figure 12-2 illustrates the format for an LLDP message. Bytes Slow protocol frame LLDP header Type Length Value (e.g. MAC address) Multicast destination address Source address Slow protocol type Sub type Reserved Version Flags Time to live Figure LLDP Message Sent over Ethernet On Ethernet networks, LLDP messages are encapsulated in an 802 Slow Protocol frame, which includes a multicast destination address and the source MAC address of the transmitting interface. The Slow Protocol frame encapsulates the LLDP header and message. Although LLDP is defined as an Ethernet protocol (802.1ab), any Layer 2 protocol can use it. ProCurve Secure Router WAN interfaces, as well as Ethernet interfaces, run LLDP. 12-3

4 The ProCurve Secure Router supports a network control protocol (NCP) called the LLDP Control Protocol (LLDPCP). This protocol allows PPP peers to negotiate the exchange of LLDP messages encapsulated in PPP frames. The router can also exchange LLDP messages over a Frame Relay or an ATM PVC. A Frame Relay frame can use Sub-Network Access Protocol (SNAP) to identify encapsulated Ethernet protocols such as LLDP. ATM subinterfaces that use AAL5 Link Layer Control/ Sub-Network Access Protocol (LLC/SNAP) encapsulation similarly exchange LLDP messages. If the ATM subinterface uses AAL5 MUX encapsulation for PPP frames, then the LLDP messages can be exchanged as described for a PPP connection. The LLDP header includes, in addition to the version field and flags, a time to live (TTL) field. The TTL informs devices how long they should store the information included in the message. The actual information in the message consists of a type length value (TLV) field. Each TLV communicates information about the interface. The information includes: chassis ID MAC address port ID the interface ID (such as ppp 1) network address at which a management process can find the device system name the device s hostname system description for example, the router s model and current Secure Router OS software system capabilities the device type (such as router or bridge) You can prevent interfaces on the ProCurve Secure Router from sending some or all of these messages. The ProCurve Secure Router automatically runs LLDP with settings suitable for a typical network. Before you alter these settings, you should examine the information that the router is actually sending and receiving. You should also understand how LLDP works so that you can capitalize on the information LLDP interfaces collect. 12-4

5 By scanning LLDP information, you can determine which devices the router can reach on the WAN and whether any unauthorized devices have contacted the local router. You can also discover useful information about neighboring devices such as their capabilities and model numbers. You can also find the address for the management agents on connecting devices so that you can configure them remotely (if authorized to do so). Viewing LLDP Neighbor Information Each router interface listens for information from devices on the connection (its neighbor or neighbors). To view information about the router s neighbors, use this enable mode command: Syntax: show lldp neighbors [interface <interface ID>] [detail] A neighbor s LLDP information includes: chassis ID MAC address system name for example, a router s hostname port ID or device port the ID for the neighbor interface that transmitted this message TTL how long, in seconds, this information should be stored platform the device model and, for the ProCurve Secure Router, the Secure Router OS version capabilities all the functions the neighbor can fulfill, which include: router bridge host DOCSIS device (a type of cable modem) WLAN Access Point repeater telephone enabled capabilities the neighbor s current function; the display gives a key for the capabilities (for example, R for router) local port or interface the interface through which the router connects to the neighbor management address an IP address at which the management agent for the neighbor can be reached Use the detail option to see the complete LLDP information for all neighbors. (See Figure 12-3.) For example, enter: 12-5

6 ProCurve# show lldp neighbors detail If you want to limit the display to the neighbor (or, for a multi-access network, neighbors) of a specific interface, use the interface <interface ID> option. For example, enter: ProCurve# show lldp neighbors interface eth 0/1 detail ProCurve# show lldp neighbors detail Chassis ID: 00:12:79:05:25:D4 (MAC Address) System Name: SiteA Neighbor s hostname Device Port: ppp 1 (Locally Assigned) TTL: 120 Platform: ProCurve Secure Router 7203dl Software: Version: 03.01, Date: Fri Aug 12 08:41: Capabilities: Bridge, Router Enabled Capabilities: Router Neighboring device type Local Port: ppp 1 Management Addresses: Address Type: IP version 4, Address: Interface Type: Interface Index, Interface Id: 15 Address from which you can configure the neighbor Figure Viewing Detailed Information about LLDP Neighbors If you enter the show lldp neighbors command without any options, you can also view a summary of the LLDP information. The summary includes only: system name (neighbor s) port ID TTL enabled capabilities platform local port 12-6

7 ProCurve# show lldp neighbors Capability Codes: R - Router, B - Bridge, H - Host, D - DOCSIS Device, W - WLAN Access Point, r - Repeater, T - Telephone System Name Port ID TTL Cap. Platform Local Int SiteA ppp R--- ProCurve Secu ppp 1 Neighbor s connecting interface How long the router should store this information Local connecting interface Figure Viewing LLDP Neighbors Figure 12-4 shows an example of the output of the show lldp neighbors command. As with the detailed display, you can limit the summary to the neighbor or neighbors of a specific interface with the interface <interface ID> option. For example: ProCurve# show lldp neighbors interface ppp 1 Alternatively, you can limit information to a specific neighbor if you know that neighbor s system name: Syntax: show lldp device <system name> A ProCurve Secure Router s system name is its hostname. For example, enter: ProCurve# show lldp device RouterA The show lldp device command automatically produces the detailed display. You can also view actual information about neighbors as this information updates in real time. (See Figure 12-5.) Enter: Syntax: show lldp neighbors realtime 12-7

8 Capability Codes: R - Router, B - Bridge, H - Host, D - DOCSIS Device, W - WLAN Access Point, r - Repeater, T - Telephone System Name Port ID TTL Cap. Platform Local Int Site B eth 0/ R--- ProCurve Secu eth 0/1 Site C ppp R--- ProCurve Secu ppp 1 Steadily counts down Exit - 'Ctrl-C', Freeze - 'f', Resume - 'r' Return to the command line Stop and start the refresh Figure Viewing LLDP Neighbors in Real Time If you want to view the entire LLDP message as it arrives, use the debug lldp commands. (See Viewing Real-Time LLDP Messages: debug lldp Commands on page 12-9.) Viewing Local LLDP Activity To see information about LLDP activity on the router, enter: Syntax: show lldp This command displays how often router interfaces send out LLDP and TTL packets. To view information about the messages the router has received from, as well as transmitted to, its neighbors, enter: Syntax: show lldp interface [<interface ID>] Figure 12-6 shows the information that displays. 12-8

9 ProCurve# show lldp interface eth 0/1 (TX/RX) 240 packets input 0 input errors 0 TLV errors, 0 TLVs Discarded 0 packets discarded 241 packets output 0 neighbor ageouts fr 1.1 (TX/RX) 235 packets input 0 input errors 0 TLV errors, 0 TLVs Discarded 0 packets discarded 235 packets output 0 neighbor ageouts Figure Viewing LLDP Activity on Router Interfaces The show lldp interface command displays the number of LLDP messages all interfaces on the local router have received (input packets) and transmitted (output packets). For the received LLDP, the command line interface (CLI) also displays the number of TLVs that had errors and that have been discarded. When a neighbor does not send an update after the TTL for a previous message has expired, the neighbor ages out. The router assumes that endpoint no longer exists. The number of aged-out neighbors is also displayed. You can also limit the information to a specific interface. For example: ProCurve# show lldp interface eth 0/1 If you want to see a summary of how many neighbors the router has added and deleted, enter: ProCurve# show lldp neighbors statistics Viewing Real-Time LLDP Messages: debug lldp Commands If your network is experiencing unexplained congestion, you can use the debug commands to explore whether a faulty interface is flooding the network with LLDP messages. You can also use the debug lldp commands to determine which interfaces are sending and receiving LLDP messages and what information these messages contain. Caution Debug messages are processor intensive. 12-9

10 You can view the LLDP messages that are arriving on interfaces in real time by entering: Syntax: debug lldp rx [verbose] If an interface seems to be receiving an undue number of messages, you can enter the show lldp neighbors interface <interface ID> command to view information about the device at fault. You should then troubleshoot that device. You can also track the LLDP activity of interfaces on the local router. To monitor the LLDP messages that the router interfaces are transmitting, enter: Syntax: debug lldp tx [verbose] If you want to change how often interfaces send messages, you can raise the minimum transmit interval. (See Altering LLDP Timers on page ) Entering the debug commands without the verbose option simply informs you when a LLDP message is sent or received. If you want to see the actual information in the message, you should add the verbose option. For example: ProCurve# debug lldp tx verbose Figure 12-7 displays an example of the verbose debug of an LLDP message. If you do not want the router to send the information you see displayed, or a specific portion of this information, you should prevent the interface from sending the corresponding type of LLDP message. WAN interfaces, in particular, can compromise a network by transmitting LLDP messages to an untrusted device. See Preventing an Interface from Sending Certain LLDP Messages on page

11 ProCurve# debug lldp tx verbose LLDP: TTL 120 LLDP: System Description "ProCurve Secure Router 7203dl" LLDP: System Name "ProCurve" LLDP: System Description "ProCurve Secure Router 7203dl, Version: 03.01, Date: Fri Aug 12 08:41: " LLDP: System Capabilities: LLDP: Bridge, Router LLDP: Enabled System Capabilities: LLDP: Router LLDP: Management Address: LLDP: Type: "IP version 4" Address: " " LLDP: Interface Type: "Interface Index" Id: 13 LLDP: OID: " " LLDP: Next Update for eth 0/1 in 30 second Figure Debugging LLDP Messages Viewing LLDP Timers You can view the global settings for LLDP timers by entering this enable mode command: Syntax: show lldp The CLI displays: how often LLDP messages are sent how often TTL updates are sent You can change how often LLDP messages are sent by changing the transmit interval and minimum transmit interval. You cannot directly change the TTL. Instead, you must change the TTL multiplier, which determines for how many transmit intervals a message is stored. The TTL is the transmit interval multiplied by the TTL multiplier. See Altering LLDP Timers on page to learn more about altering timers

12 Configuring LLDP Configuring LLDP All active interfaces on the ProCurve Secure Router, except for ATM subinterfaces, automatically send out LLDP messages. (See Table 12-2 on page for the default transmit intervals.) For most networks, the default settings for LLDP are adequate. If you so choose, you can attempt to minimize overhead or to restrict the information the router transmits about itself by: preventing an interface from sending certain LLDP messages preventing an interface from receiving LLDP messages altering the intervals for sending LLDP messages Preventing an Interface from Sending Certain LLDP Messages By default, the ProCurve Secure Router sends LLDP messages over all Ethernet and logical interfaces except ATM subinterfaces, which do not support LLDP. These messages include information about the interface and about the local router: MAC address port ID router model and Secure Router OS software version router s hostname system capabilities network address at which a management process can find the device You should be cautious about the information that you allow WAN interfaces to transmit, particularly on routers that connect to an external network. An unauthorized device can learn a great deal about your system from LLDP messages. To restrict an interface from transmitting LLDP messages, move to the configuration mode context for the interface and enter: Syntax: no lldp send [management-address port-description system-capabilities system-description system-name] 12-12

13 Configuring LLDP Enter no lldp send without any options to prevent the interface from transmitting any messages. You can restrict the interface from sending only certain messages by entering the no form of the lldp send command followed by the specific option. For example, if a WAN interface transmits the management address into an untrusted environment, hackers could attempt to access your router. On the other hand, sending this address to authorized management processes allows network administrators at hub sites to access and manage routers at remote sites. Preventing interfaces from sending messages that you consider less important can minimize the protocol s chattiness. Refer to Table 12-1 for the commands for suppressing or enabling specific types of LLDP messages. Table Suppressing and Enabling LLDP Messages Message Command Syntax IP address for the interface s management agent interface s port ID system capabilities (for example, router or bridge) router model and software version router s hostname [no] lldp send management-address [no] lldp send port-description [no] lldp send system-capabilities [no] lldp send system-description [no] lldp send system-name LLDP messages must include a MAC address (chassis ID). If you do not want the interface to send its MAC address, you must prevent it from transmitting any LLDP messages. Note Even after you prevent an interface from transmitting LLDP messages, it can still listen for them

14 Configuring LLDP Preventing an Interface from Receiving LLDP Messages You can prevent an interface from listening for LLDP messages by moving to its configuration mode context and entering: Syntax: no lldp receive You cannot filter out certain types of information. The interface either receives all LLDP messages or none. Note Preventing an interface from receiving LLDP messages does not stop it from sending them. You prevent an interface from participating in LLDP entirely with this command, entered from the interface configuration mode context: Syntax: no lldp send-and-receive Altering LLDP Timers LLDP can be chatty; you can increase the intervals at which interfaces transmit messages to reduce network congestion. The transmit interval determines how often an interface sends out LLDP messages during normal operations. However, the interface can send messages more often for example, when its status changes. A flapping interface, which toggles between up and down, may send messages out again and again. If LLDP messages are causing too much overhead, you can force the interface to wait a set amount of time before transmitting a new message by raising the minimum transmit interval. An LLDP header includes a TTL field that informs neighboring devices how long they should store the information in the message. The interface sets the TTL field by multiplying the transmit interval by the TTL multiplier. By default, this multiplier is four. That is, information is assumed to be accurate for four LLDP cycles. You configure LLDP intervals for all interfaces from the global configuration mode context. Refer to Table 12-2 for the exact command syntax

15 Quick Start Table LLDP Intervals Interval Meaning Default Range Command Syntax transmit interval minimum transmit interval ttl multiplier reinitialization delay time between sending LLDP messages during normal operations minimum time the interface must wait before sending a new LLDP message number of transmit intervals information should be stored time an interface must wait to send an LLDP message after LLDP is re-enabled 30 seconds 5 to 32,768 seconds lldp transmit-interval <seconds> 2 seconds 1 to 8192 lldp minimumtransmit-interval <seconds> 4 2 to 10 lldp ttl-multiplier <value> 2 seconds 1 to 10 seconds lldp reinitializationdelay <seconds> Quick Start All Ethernet and logical interfaces on the ProCurve Secure Router, except ATM subinterfaces, automatically run LLDP. Typically, you do not need to change any configurations. This section provides the commands you must enter to quickly: disable LLDP on a specific interface disable an interface from sending specific types of information about the router view information about LLDP neighbors Only a minimal explanation is provided. If you need additional information about any of these options, check Contents on page 12-1 to locate the section that contains the explanation you need. 1. You can disable LLDP on a specific interface. Move to its configuration mode context and enter one or more of these commands: a. To disable LLDP entirely, enter: Syntax: no lldp send-and-receive 12-15

16 Quick Start b. You can also prevent the router from sending any LLDP messages, while still allowing it to listen for messages. Syntax: no lldp send c. To only prevent the router from receiving LLDP messages, enter: Syntax: no lldp receive Enter a command without the no option to re-enable the function. 2. You can prohibit an interface from sending some kinds of information about the router, but allow it to send other information. Move to the interface s configuration mode context. Then enter this command followed by the keyword for the type of information that you want to restrict: Syntax: no lldp send [management-address port-description system-capabilities system-description system-name] Table 12-3 explains what information is associated with each keyword. Enter the command without the no option to re-enable the router to send that information. Table Prohibiting an Interface from Sending Certain LLDP Messages Keyword Information management-address port-description system-capabilities system-description system-name IP address at which a management process can reach the router interface s port ID system s capabilities (for example, router or bridge) router model and software version router s hostname 3. To view information about the router s neighbors, move to the global configuration mode context and enter: Syntax: show lldp neighbors [interface <interface ID>] [detail] Use the interface <interface ID> option to view information about only a specific interface s neighbor. The detail option displays all LLDP information. 4. To view information about a specific device, enter: Syntax: show lldp device <system name> 12-16

Chapter 46 Link Layer Discovery Protocol (LLDP)

Chapter 46 Link Layer Discovery Protocol (LLDP) Chapter 46 Link Layer Discovery Protocol (LLDP) Introduction...46-3 LLDP Overview...46-3 Type Length Values... 46-4 Transmission and Reception... 46-5 Storing LLDP Information... 46-7 Configuring LLDP...46-9

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Domain Name System (DNS) Services

Domain Name System (DNS) Services 12 Domain Name System (DNS) Services Contents Overview..................................................... 12-3 Host and Domain Names.................................... 12-3 Host Tables...............................................

More information

IP Routing Configuring Static Routes

IP Routing Configuring Static Routes 11 IP Routing Configuring Static Routes Contents Overview..................................................... 11-3 IP Addressing.............................................. 11-3 Networks.................................................

More information

IP Routing Configuring RIP, OSPF, BGP, and PBR

IP Routing Configuring RIP, OSPF, BGP, and PBR 13 IP Routing Configuring RIP, OSPF, BGP, and PBR Contents Overview..................................................... 13-6 Routing Protocols.......................................... 13-6 Dynamic Routing

More information

Configuring LLDP, LLDP-MED, and Location Service

Configuring LLDP, LLDP-MED, and Location Service 27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service

More information

L2 / L3 Switches. Link Layer Discovery Protocol (LLDP) Configuration Guide

L2 / L3 Switches. Link Layer Discovery Protocol (LLDP) Configuration Guide L2 / L3 Switches Link Layer Discovery Protocol (LLDP) Configuration Guide Revision 1.0 The information in this USER S MANUAL has been carefully reviewed and is believed to be accurate. The vendor assumes

More information

Content Filtering. Contents

Content Filtering. Contents 7 Content Filtering Contents Overview...................................................... 7-2 Risks Posed by Non-Work-Related Use of the Internet............ 7-2 Web Content Filtering on the ProCurve

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

Using Link Layer Discovery Protocol in Multivendor Networks

Using Link Layer Discovery Protocol in Multivendor Networks Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates

More information

Packet-over-SONET Interface Commands on the Cisco IOS XR Software

Packet-over-SONET Interface Commands on the Cisco IOS XR Software Packet-over-SONET Interface Commands on the Cisco IOS XR Software This module provides command line interface (CLI) commands for configuring Packet-over-SONET/SDH (POS) on the Cisco CRS Router. This module

More information

How To Configure Voice Vlan On An Ip Phone

How To Configure Voice Vlan On An Ip Phone 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Configuring T1 and E1 WAN Interfaces

Configuring T1 and E1 WAN Interfaces Configuration Guide 5991-3823 December 2005 Configuring T1 and E1 WAN Interfaces This configuration guide explains the processes for configuring your Secure Router Operating System (SROS) T1/E1 product

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN assignment to Avaya 4600 Series IP Telephones

More information

High-Level Data Link Control

High-Level Data Link Control High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)

More information

Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication

Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Requirements You can configure voice over IP (VoIP) on an EX Series switch to support IP telephones. To configure

More information

Common Application Guide

Common Application Guide April 2009 Common Application Guide WAN Failover Using Network Monitor Brief Overview of Application To increase reliability and minimize downtime, many companies are purchasing more than one means of

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

ADSL WAN Connections. Contents

ADSL WAN Connections. Contents 7 ADSL WAN Connections Contents ADSL Overview................................................. 7-4 ADSL Technologies.......................................... 7-5 ADSL2 and ADSL2+: Enhancing Transmission

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Cisco 12 CCNA Certification

Cisco 12 CCNA Certification Cisco 12 CCNA Certification Application for Board Authorization of Courses District: Chilliwack School District 33 Developed by: John Murtha Date: May7, 2004 School: Sardis Secondary Principal: Bob Patterson

More information

Configuring Network Address Translation

Configuring Network Address Translation 6 Configuring Network Address Translation Contents NAT Services on the ProCurve Secure Router....................... 6-2 Many-to-One NAT for Outbound Traffic........................ 6-2 Using NAT with

More information

Configuring DHCP Snooping

Configuring DHCP Snooping CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

TRILL for Data Center Networks

TRILL for Data Center Networks 24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview

More information

INTRODUCTION TO L2VPNS

INTRODUCTION TO L2VPNS INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN Assignment for Avaya 9600 and 1600 Series

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (

How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) ( You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL

More information

Technote. SmartNode Quality of Service for VoIP on the Internet Access Link

Technote. SmartNode Quality of Service for VoIP on the Internet Access Link Technote SmartNode Quality of Service for VoIP on the Internet Access Link Applies to the following products SmartNode 1000 Series SmartNode 2000 Series SmartNode 4520 Series Overview Initially designed

More information

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1 Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate

More information

How To Configure A Network Monitor Probe On A Network Wire On A Microsoft Ipv6 (Networking) Device (Netware) On A Pc Or Ipv4 (Network) On An Ipv2 (Netnet) Or Ip

How To Configure A Network Monitor Probe On A Network Wire On A Microsoft Ipv6 (Networking) Device (Netware) On A Pc Or Ipv4 (Network) On An Ipv2 (Netnet) Or Ip 61700600L2-29.3D January 2014 Configuration Guide This configuration guide describes network monitoring and its use on ADTRAN Operating System (AOS) products. This guide contains information about the

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Link Aggregation Between EX Series Switches and Ruckus Wireless Access Points Modified: 2015-10-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California

More information

isco Troubleshooting Input Queue Drops and Output Queue D

isco Troubleshooting Input Queue Drops and Output Queue D isco Troubleshooting Input Queue Drops and Output Queue D Table of Contents Troubleshooting Input Queue Drops and Output Queue Drops..1 Interactive: This document offers customized analysis of your Cisco

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

ProCurve Secure Router OS Firewall Protecting the Internal, Trusted Network

ProCurve Secure Router OS Firewall Protecting the Internal, Trusted Network 4 ProCurve Secure Router OS Firewall Protecting the Internal, Trusted Network Contents Overview...................................................... 4-3 Advantages of an Integrated Firewall...........................

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

NetVanta Series (with Octal T1/E1 Wide Module)

NetVanta Series (with Octal T1/E1 Wide Module) NET 1 LAN 1 NET 2 LAN 2 WIDE SLOT 1 ACTIVITY TEST NET 1 NET 1 LAN 1 LAN 2 WIDE SLOT 1 NET 2 ACTIVITY TEST LAN 1 NET 2 LAN 2 NET 1 WIDE SLOT 1 ACTIVITY TEST LAN 1 NET 2 LAN 2 WIDE SLOT 1 ACTIVITY TEST NetVanta

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

! encor en etworks TM

! encor en etworks TM ! encor en etworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Configuring the BANDIT III s T1 E1 Card for a PCM Voice Network The T1 E1 card fits into the expansion slot on

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Configuring IP Load Sharing in AOS Quick Configuration Guide

Configuring IP Load Sharing in AOS Quick Configuration Guide Configuring IP Load Sharing in AOS Quick Configuration Guide ADTRAN Operating System (AOS) includes IP Load Sharing for balancing outbound IP traffic across multiple interfaces. This feature can be used

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

IPv6 Diagnostic and Troubleshooting

IPv6 Diagnostic and Troubleshooting 8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................

More information

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet The internetworking solution of the Internet Prof. Malathi Veeraraghavan Elec. & Comp. Engg. Dept/CATT Polytechnic University mv@poly.edu What is the internetworking problem: how to connect different types

More information

GLBP - Gateway Load Balancing Protocol

GLBP - Gateway Load Balancing Protocol GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy

More information

Troubleshooting an Enterprise Network

Troubleshooting an Enterprise Network Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Problem: the router is a single point of failure H1 H2 H3 VLAN4 H4 VLAN4 Corporate LAN Corporate LAN R1 R2

More information

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

OSPF Routing Protocol

OSPF Routing Protocol OSPF Routing Protocol Contents Introduction Network Architecture Campus Design Architecture Building Block Design Server Farm Design Core Block Design WAN Design Architecture Protocol Design Campus Design

More information

Figure 1 - T1/E1 Internet Access

Figure 1 - T1/E1 Internet Access Page 1 of 17 TECH NOTE Configuring T1 and E1 Internet Access in AOS Overview This guide explains how to configure an Adtran Operating System (AOS) router for T1/E1 Internet access. You should use this

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

Voice Over IP Per Call Bandwidth Consumption

Voice Over IP Per Call Bandwidth Consumption Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before

More information

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement Prestige 310 Cable/xDSL Modem Sharing Router User's Guide Supplement Domain Name Support Enhanced WAN Setup Remote Node Support PPPoE Support Enhanced Unix Syslog Setup Firmware and Configuration Files

More information

Configuring Demand Routing for Primary ISDN Modules

Configuring Demand Routing for Primary ISDN Modules 8 Configuring Demand Routing for Primary ISDN Modules Contents Overview of ISDN Connections................................... 8-4 Elements of an ISDN Connection.............................. 8-5 The Local

More information

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Default gateway redundancy (1) H1 DG: R1 H2 DG: R1 H3 DG: R1 R1 R2 ISP1 ISP2 Internet 3 Default gateway redundancy

More information

Port Trunking. Contents

Port Trunking. Contents 12 Port Trunking Contents Overview..................................................... 12-2................................... 12-2 Port Connections and Configuration.......................... 12-3 Link

More information

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Integrated Traffic Monitoring

Integrated Traffic Monitoring 61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

How Much Broadcast and Multicast Traffic Should I Allow in My Network?

How Much Broadcast and Multicast Traffic Should I Allow in My Network? PowerConnect Application Note #5 November 2003 How Much Broadcast and Multicast Traffic Should I Allow in My Network? This Application Note relates to the following Dell PowerConnect products: PowerConnect

More information

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c

Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c telco Leased Line CSU/DSU Local Telephone Company Owns the cables and has right of way

More information

Bandwidth Management in MPLS Networks

Bandwidth Management in MPLS Networks School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie

More information

Chapter 25 DHCP Snooping

Chapter 25 DHCP Snooping Chapter 25 DHCP Snooping Introduction...25-2 The Binding Database... 25-2 DHCP Filtering... 25-4 DHCP Option 82... 25-4 DHCP Snooping ARP Security... 25-5 Configuration Examples...25-5 Command Reference...25-6

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

IP Application Services Commands show vrrp. This command was introduced. If no group is specified, the status for all groups is displayed.

IP Application Services Commands show vrrp. This command was introduced. If no group is specified, the status for all groups is displayed. show vrrp show vrrp To display a brief or detailed status of one or all configured Virtual Router Redundancy Protocol (VRRP) groups on the router, use the show vrrp command in privileged EXEC mode. show

More information

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Configuring EtherChannels

Configuring EtherChannels CHAPTER 12 This chapter describes how to configure EtherChannels on the Cisco 7600 series router Layer 2 or Layer 3 LAN ports. For complete syntax and usage information for the commands used in this chapter,

More information

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

More information

Dynamic Host Configuration Protocol (DHCP)

Dynamic Host Configuration Protocol (DHCP) 13 Dynamic Host Configuration Protocol (DHCP) Contents Overview..................................................... 13-3 DHCP Request Process...................................... 13-3 The ProCurve Secure

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

NetFlow Subinterface Support

NetFlow Subinterface Support NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the

More information